Sciweavers

59 search results - page 8 / 12
» Investigating Two Different Approaches for Encrypted Traffic...
Sort
View
NETWORKING
2004
13 years 8 months ago
On Detection of Anomalous Routing Dynamics in BGP
BGP, the de facto inter-domain routing protocol, is the core component of current Internet infrastructure. BGP traffic deserves thorough exploration, since abnormal BGP routing dy...
Ke Zhang, Amy Yen, Xiaoliang Zhao, Daniel Massey, ...
TCSV
2008
139views more  TCSV 2008»
13 years 6 months ago
Trajectory-Based Anomalous Event Detection
Abstract--During the last years, the task of automatic event analysis in video sequences has gained an increasing attention among the research community. The application domains ar...
Claudio Piciarelli, Christian Micheloni, Gian Luca...
ICASSP
2010
IEEE
13 years 7 months ago
Leveraging evaluation metric-related training criteria for speech summarization
Many of the existing machine-learning approaches to speech summarization cast important sentence selection as a two-class classification problem and have shown empirical success f...
Shih-Hsiang Lin, Yu-Mei Chang, Jia-Wen Liu, Berlin...
ISJGP
2010
13 years 4 months ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
CHI
2008
ACM
14 years 7 months ago
Exploring the use of tangible user interfaces for human-robot interaction: a comparative study
In this paper we suggest the use of tangible user interfaces (TUIs) for human-robot interaction (HRI) applications. We discuss the potential benefits of this approach while focusi...
Cheng Guo, Ehud Sharlin